Hi [[ session.user.profile.firstName ]]

Inside (ISC)² Quarterly Board Update, 2021 (Q1)

Join us for (ISC)² Insights, a quarterly review of our association’s latest accomplishments. Each quarter, the (ISC)² Board of Directors Chairperson and CEO will update members on the association’s strategic roadmap, new achievements and milestones, the latest on our certifications, new professional development opportunities, member offers and more.
Recorded Mar 12 2021 20 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Clar Rosso, (ISC)² CEO; Zach Tudor, Chair of the Board, (ISC)²
Presentation preview: Inside (ISC)² Quarterly Board Update, 2021 (Q1)

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Countering Threat Evasion: You Cannot Stop What You Cannot See! Jun 17 2021 5:00 pm UTC 60 mins
    Bob Hansmann, Sr. Product Marketing Manager - Security, Infoblox; Brandon Dunlap, Moderator
    Cybercriminals must become masters of evasion if they are to be successful. Many threats, such as APT’s, are designed to remain hidden for weeks or longer as they slowly monitor their victim, compromising select information in a way that is also intended to go unnoticed. Others, like ransomware, may only need to hide their malicious intentions long enough to infect and begin encryption processes. And even when these attacks trip some defensive sensor, it can take analysts days to investigate and launch an effective incident response, often too late to prevent significant damage. Join Infoblox and (ISC)2 on June 17, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we assess evasion methodologies and the value of DNS, with some unique North American callouts, to counter them across the kill chain including:

    · Why does DNS visibility expose threat activity other solutions miss?

    · How can DNS visibility be used to make other solutions more effective?

    · What role does DNS play in investigation and response?
  • Become Cyber Resilient - The Next Generation of Cyber Investigations & IR Jun 8 2021 5:00 pm UTC 60 mins
    Bryan Sartin, Chief Services Officer, eSentire; Brandon Dunlap, Moderator
    Cyber investigations and Incident Response (IR) stand to benefit more from disruption than any proficiency in security. What should and could be on the leading edge still relies on outdated, people-heavy approaches, and circa 2005 technologies. Shockingly, this is still how some of the biggest players in the industry tackle the most brand damaging cyber events today. This traditional engagement model is tedious; takes too long and costs too much. Smarter, better and faster options are within our grasp. Join eSentire and (ISC)2 on June 8, 2021 at 1:00 p.m. Eastern/ 10:00 a.m. Pacific for an examination of some of the big rock innovations that are accelerating and revolutionizing the IR world. We’ll cover advancements in endpoint and network sensors, and process improvements in evidence acquisition and analysis and will pivot to forward-leaning engagement models converging IR, cyber intelligence and SOC analyst expertise. Other topics to be covered include:

    - How modern day cyber investigations and Incident Response can leap off the starting blocks more quickly, with faster time-to-execution and time-to-value for customers.

    - How the next generation of cyber investigation and Incident Response will change the game for information security executives who are looking for a leg up when going into battle to protect their businesses from cybersecurity incidents.
  • Building Your Cybersecurity Bench: (ISC)2’s Cybersecurity Career Pursuers Study May 18 2021 5:00 pm UTC 60 mins
    Clar Rosso, (ISC)2 CEO; Brandon Dunlap, Moderator
    As organizations continue to struggle to find trained cybersecurity professionals to build out their teams, recruiters and hiring managers may need to adjust the tactics they use to proactively identify internal and external candidates. Developing bench strength by targeting candidates who have transferable skills can lead to long term depth and stability on security teams. Understanding who to look for and managing their expectations of what cybersecurity roles entail is critical to success. Join Clar Rosso, CEO of (ISC)2 on May 18, 2021 at 1:00 p.m, Eastern/10:00 a.m. Pacific as she provides an overview of the 2021 (ISC)2 Cybersecurity Career Pursuers Study, which surveyed both experienced cybersecurity professionals as well as jobseekers considering a career in the field. The study examines such topics as which tasks and experiences make a cybersecurity professional successful, the value of mentorship, at what point in their careers pursuers seem likely to seek a cybersecurity path, what attracts people to the profession and which qualities rank as strong indicators of future success for team members.
  • Demystifying WAN-as-a-Service May 13 2021 5:00 pm UTC 60 mins
    Vivek Ganti, Security Product Marketing, Cloudflare; Brandon Dunlap, Moderator
    The building blocks of traditional WAN architectures are showing their age. MPLS is expensive and has painfully slow deployment times. Broadband Internet does not deliver the millisecond performance and constant reliability needed for most business applications today. And neither infrastructure was designed with security in mind. Compounding matters further, the surge in remote work and increased cloud adoption is straining traditional WAN architectures. WAN-as-a-service is a cloud-based WAN architecture that offers global scale, integrated enterprise network security functions, and direct, secure connectivity to remote users. Join Cloudflare and (ISC)2 on May 13, 2021 at 1:00PM Eastern for an examination on how WAN-as-a-Service can increase operational agility and lower total costs of ownership and solve the inherent challenges associated with MPLS and broadband Internet.

    We’ll also cover:

    · What is WAN-as-a-service and what are its advantages over traditional WAN architectures
    · How can enterprises build and deploy a successful WAN strategy with fast connectivity and robust security built-in
    · How enterprises can increase your operational agility with easy deployment and management of network services
  • Crypto Service Mesh - A New Perspective to Enterprise Cryptography May 6 2021 5:00 pm UTC 60 mins
    Muralidharan Palanisamy, Chief Solutions Officer, AppViewX; Brandon Dunlap, Moderator
    Cryptography is omnipresent. Every business unit uses crypto in some shape or form. A marketing web page uses a TLS certificate to assert its identity. A CRM solution that stores customer data uses symmetric key cryptography to encrypt data at rest.

    An organization's digital security is only as strong as its business units' weakest crypto practices. This has forced organizations to rethink the way teams consume crypto services and driven the need for centralized orchestration and control. Join AppviewX and (ISC)2 on May 6, 2021, at 1:00 PM Eastern Time for a discussion on how a Crypto Service Mesh orchestrates all the diverse crypto services in an organization, abstracts the nitty-gritty details, and provides a standardized, user-friendly, policy-controlled way for different business units to consume these services. We’ll examine:

    · How various business units consume crypto today

    · An introduction to Crypto Service Mesh

    · How a Crypto Service Mesh weaves together people, process, and technology
  • Beyond the Buzzwords – The Trends Behind SASE and Zero Trust Recorded: May 4 2021 59 mins
    Eric Cornelius, Chief Product Officer, iboss; Brandon Dunlap, Moderator
    Zero Trust has generated a great deal of “buzz” in the last few years. Many solution providers tout the benefits of Zero Trust, but the approach may not be a fit for you and your organization. Join iboss and (ISC)2 on May 4, 2021 at 1:00PM Eastern as we explore the evolution of network security design principles in order to gain a deeper understanding of how technology can be leveraged to meet evolving user needs and the behavioral and technological direction behind SASE and Zero Trust.
  • ExtraHop #1: How To Stop Breaches Faster with Integrated NDR & EDR Recorded: Apr 26 2021 66 mins
    Chase Snyder, Sr. Security Product Marketing Manager, ExtraHop; Dixon Styres, Solutions Architect, Crowdstrike; Sharon Smith
    Defending against advanced threats requires advanced insights from the three foundational data sources for security operations: endpoint data, log data, and the network. In the first part of a three-part series, we'll discuss:

    ·advanced threat behaviors, how they gain access to the network through both commonplace and sophisticated means, how they act once they're inside.

    ·how to leverage the three foundational data sources, integrated into a best-of-breed XDR approach to detect and investigate advanced threats like supply chain attacks, insider threats, and more

    ·how to rapidly respond to minimize the blast radius and reduce business impact when an advanced threat gets inside.
  • Cloud Native Vulnerability Mgmt: Securing Container Images, VMs, and Functions Recorded: Apr 22 2021 61 mins
    Steven Zimmerman, Sr. Product Marketing Manager, Aqua Security; Brandon Dunlap, Moderator
    Full cloud native security requires more than application security testing and network monitoring. It requires a concerted approach to vulnerability management within CI/CD pipelines, in pre-production testing, and at runtime. Join Aqua Security and (ISC)2 on April 22, 2021 at 1:00PM Eastern for an examination on how to secure applications in complex cloud native ecosystems, including:

    · Detecting vulnerabilities and exploits in container images, VMs, and serverless functions

    · Prioritizing and triaging security risks to accelerate remediation

    · Uncovering hidden malware and attack kill chains before they’re executed in production
  • ExtraHop #2: Stopping Advanced Threats Doesn't Require a Big Budget Recorded: Apr 21 2021 61 mins
    Aaron Davidson, Sr. Sales Engineer, ExtraHop; Don Shin, Sr. Security PMM, ExtraHop; Sharon Smith, Moderator
    Security and compliance frameworks from CIS, NIST, and PCI SSC point to long lists of must-have technology to build secure and compliant defenses. But they don’t tell us which ones to do first or how to allocate our limited budgets. Advanced Threats follows a land and pivots toward your valuables workflow. This knowledge gives you a roadmap to prioritize investments while leaving others as “good enough” that fit your budget and time constraints.

    Join ExtraHop experts to get insights into building effective layered defenses that prioritize your budget:

    - How the “Defender’s Dilemma” should guide your investments at the edge

    - How “Intruder’s Dilemma” sets the network trap for intruders and advanced threats

    - Why your IDS needs a next-gen upgrade against advanced threats

    - See how NG-IDS stops advanced threats (demonstration)
  • Modernize Security Operations using MITRE ATT&CK with a Cloud SIEM Recorded: Apr 20 2021 60 mins
    Girish Bhat, VP, Sumo Logic; Paul Tobia, Senior Product Manager, Sumo Logic; B. Dunlap, Moderator
    Modernizing Security Operations involves a combination of people, process, technology, and services to manage risk, monitor, detect, and respond to cybersecurity threats and incidents. Security leaders seeking to modernize security operations face serious challenges in identifying the resources, expertise and tools to meet their goals. Over the past few years, MITRE ATT&CK® a globally-accessible knowledge base of adversary tactics and techniques has gained prominence as a way to determine the effectiveness of Security Operations to detect, analyze, and respond to attacks. Join Sumo Logic and (ISC)2 on April 20, 2021 at 1:00PM Eastern for an exploration on how security practitioners can leverage the MITRE ATT&CK framework and integrate using the Sumo Cloud SIEM.
  • Top 3 Trends in Today’s Cyber Attack Landscape Recorded: Apr 15 2021 61 mins
    Ryan Toohil, Chief Technology Officer & Head of Platform, Aura; Will Taylor, Senior Security Consultant, NXTsoft; B. Dunlap
    Cyber attacks are at an all-time high and threat actors are becoming more sophisticated in their attempts. When considering today’s trends (and threats) in the industry, three recurring themes often come up amongst Cybersecurity professionals: the continued growth of ‘double extortion’ ransomware attacks, the increased risk that employee identity theft poses to organizations, and the additional fallout from supply chain attacks. Join Aura, NXTsoft, and (ISC)2 on April 15, 2021 at 1:00 PM Eastern as we discuss these three cyber threat trends and different ways you can address them within your organization.
  • Protecting the Enterprise: 5 Components needed for Cybersecurity Training Recorded: Apr 13 2021 62 mins
    Spencer Wilcox, CISO, PNM; Derrick Butts, CISO, The Truth Initiative; Mirtha Collin, (ISC)2; Brandon Dunlap, Moderator
    It’s difficult to prescribe a one-size-fits-all approach to training your cybersecurity team. While cybersecurity training needs to be structured and adhere to industry standards, it also must be purposeful and tailored to your organization’s needs. No one organization has precisely the same security needs as another. However, many of the fundamentals of a training and education program apply across different organizations and sectors. Join (ISC)2 for a panel discussion on Tuesday, April 13, 2021 at 1:00PM Eastern as industry leaders share tips they’ve learned and strategies they’re working towards to conquer a secure and compliant cybersecurity training program. Areas for discussion will include:

    · Who needs training

    · Who is responsible for training

    · Determining the curriculum

    · Training and certification

    · Ensuring training effectiveness

    Be prepared for an hour well-spent and discover how to create a cybersecurity training plan that maps to your organization’s specific needs.
  • ExtraHop #3: How NG-IDS Stops Advanced Threats Legacy IDS Misses Recorded: Apr 9 2021 58 mins
    Jon Oltsik, ESG; Don Shin, ExtraHop; Jesse Munos, ExtraHop; Sharon Smith (Moderator)
    Supply Chain attacks, Zero-Days, and Advanced Persistent Threats (APTs) are effective because they target the trust models traditional security products were built on. The result is a post-compromise world where traditional IDS technology is looking in the wrong direction based on outdated assumptions to detect and stop modern attacks. Join John Oltsik from ESG and ExtraHop experts to learn how machine learning NG-IDS gives you back the edge against Advanced Threats :

    · Why Advanced Threats require a post-compromise posture

    · How time has been unkind to that noisy 90s IDS

    · How to fill IDS compliance gaps and increase security efficacy

    · How NG-IDS stops Advanced Threats before they do real damage
  • Gigamon #3: Securing the Hybrid Cloud: 5G Networks Recorded: Apr 8 2021 61 mins
    Gordon Beith, Senior Director, Product Marketing, Gigamon; Brandon Dunlap, Moderator
    5G networks, almost by definition, are hybrid cloud networks. Any company adopting 5G is in effect adopting a hybrid cloud model. As mobile network service providers launch their 5G services around the world starting with radio access network (RAN) deployment followed by the core network, security vulnerabilities, including preventing or mitigating their effects, are top of mind. Whether the network functions and services are physical, virtual on-prem, or public cloud, ensuring comprehensive continuous visibility into the network is crucial to ensuring and maintaining adequate security. Join Gigamon and (ISC)2 on April 9, 2021 at 1:00PM Eastern for a discussion on understanding how coherent, high-fidelity network data can enable a strong security posture without breaking the bank.
  • The Security Outcomes Study: A Blueprint to Enable Growth and Mitigate Risk Recorded: Apr 6 2021 60 mins
    Cindy Valladares, Head of Security Thought Leadership, Cisco; Steve Caimi, Cyber Specialist, Cisco; B. Dunlap, Moderator
    Cybersecurity is about priorities, but the challenge is knowing what works and what doesn’t. What if you could learn from thousands of peers, around the globe, about how they’re succeeding? You can. Cisco recently commissioned the Security Outcomes Study, outlining which security best practices lead to the most impactful results. Join Cisco and (ISC)2 on April 6, 2021 at 1:00PM Eastern for a discussion that will cover:

    · The business outcomes that cyber professionals are working to achieve

    · The specific security practices that contribute the most

    · How to use their advice to improve your cyber program today
  • SolarWinds Fallout Has Execs Asking: How Secure is Our Supply Chain? Recorded: Mar 30 2021 59 mins
    Thomas Scanlon, Carnegie Mellon/CERT; Andrew Boyle, BAH; Shawn Harris, Starbucks; Brandon Dunlap, Moderator
    The ramifications of the SolarWinds incident continue to evolve as more details emerge about the impact it had on a wide range of organizations. A recent survey of more than 300 cybersecurity practitioners by (ISC)2reveals just how concerning the incident was and what these professionals recommend to shield organizations from similar supply chain threats. Join this panel discussion on March 30, 2021 at 1:00pm Eastern to hear anecdotes and best practices related to third-party technologies in the security stack, and how peers in cybersecurity leadership positions are future-proofing their defenses while planning for worst case scenario.
  • Inside (ISC)²: Updates on Exams and Certifications Recorded: Mar 23 2021 61 mins
    Clar Rosso, (ISC)² CEO; Dr. Casey Marks, Chief Product Office and VP, (ISC)²
    Clar Rosso, CEO of (ISC)2 shares the latest insights on what’s happening at our association. Join us for this quarterly update where we cover the latest developments at (ISC)2, ranging from certification to member benefits, continuing education and events, to major milestones and achievements.

    Joining Clar this quarter is Dr. Casey Marks, chief product officer and VP of (ISC)2, to discuss the latest in Exams and certifications.
  • Global Impressions: Endpoint Security Strategies for the Long-Term Recorded: Mar 18 2021 61 mins
    Bob Hansmann, Sr. Product Marketing Manager – Security, Infoblox; Brandon Dunlap, Moderator
    After a painful but relatively successful response to workplace changes driven by the pandemic, how well are those security measures working and what is next for the evolution of the SOC and endpoint security in specific? For most organizations, the future involves a larger remote workforce, of both full and part-time workers, including those in traditional HQ office roles. But many of the measures taken in response to pandemic conditions are proving less-than-ideal as long-term solutions. Join Infoblox and (ISC)2 on March 18, 2021 at 1:00PM Eastern for a session that will draw on recent analyst reports and surveys conducted globally, with some North American specific call-outs, to help attendees to better understand…· Which security alternatives are leaders considering as long-term solutions, and why?

    · What techniques are helping to improve visibility for users and devices regardless of their location?

    · Why are security leaders evolving methods for obtaining and using cyber threat intelligence?

    · How can embracing automation improve response times and overall operational efficiencies?
  • Inside (ISC)² Quarterly Board Update, 2021 (Q1) Recorded: Mar 12 2021 20 mins
    Clar Rosso, (ISC)² CEO; Zach Tudor, Chair of the Board, (ISC)²
    Join us for (ISC)² Insights, a quarterly review of our association’s latest accomplishments. Each quarter, the (ISC)² Board of Directors Chairperson and CEO will update members on the association’s strategic roadmap, new achievements and milestones, the latest on our certifications, new professional development opportunities, member offers and more.
  • Gigamon #2: Securing the Hybrid Cloud: Optimizing SIEM Recorded: Mar 9 2021 59 mins
    Muhammad Durrani, Technical Marketing Engineer, Gigamon; Brandon Dunlap, Moderator
    SIEM systems are pivotal to IT organization’s security operations. Many companies are adopting a hybrid cloud model, and cloud-based SIEMs are becoming common as a result. Regardless of on-prem or cloud deployments, the challenges around SIEM remain the same, from data overload, lack of contextual information, to high costs. Security best practices in deploying SIEMs also remain unchanged, which include establishment of use cases, data ingestion types and development of parsers for various tool vendors. On March 9, 2021 at 1:00pm Eastern, Gigamon and (ISC)2 will present a webinar that will cover solutions to these challenges such as Gigamon’s Application Metadata Intelligence as well as various smart filtering techniques.
(ISC)² Security Briefings - In-depth examination of infosec topics.
(ISC)² Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Inside (ISC)² Quarterly Board Update, 2021 (Q1)
  • Live at: Mar 12 2021 7:30 pm
  • Presented by: Clar Rosso, (ISC)² CEO; Zach Tudor, Chair of the Board, (ISC)²
  • From:
Your email has been sent.
or close